SEC301 Security IN the AWS Cloud - AWS re: Invent 2012

4,464 views

Published on

There are so many different thoughts about how to secure your applications running in AWS that it can be confusing to know where to start. In this session, we cover tips, tricks, and emerging best practices for securing your applications. We discuss topics ranging from how to configure your AWS resources to options for logging and intrusion detection. Discover that running your applications in AWS gives you a great head start.

SEC301 Security IN the AWS Cloud - AWS re: Invent 2012

  1. 1. awsmax@amazon.com
  2. 2. http://aws.amazon.com/security
  3. 3. http://www.sans.org/critical-security-controls/
  4. 4. http://aws.amazon.com/security/penetration-testing/
  5. 5. http://aws.amazon.com/architecturehttp://aws.amazon.com/aws-training
  6. 6. http://aws.amazon.com/premiumsupport/trustedadvisor/
  7. 7. http://aws.amazon.com/code/1288653099190193
  8. 8. https://aws-portal.amazon.com/gp/aws/html-forms-controller/contactus/ec2-email-limit-rdns-request
  9. 9. abuse@amazonaws.comaws-security@amazon.com
  10. 10. http://aws.amazon.com/security/penetration-testing/
  11. 11. http://aws.amazon.com/contact-us/
  12. 12. We are sincerely eager to hear your feedback on thispresentation and on re:Invent. Please fill out an evaluation form when you have a chance.

×